Journal articles on the topic 'Network Systems of Comprehensive Assessment'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Network Systems of Comprehensive Assessment.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Yakymchuk, N. M., and A. I. Toroshanko. "METHODS OF IDENTIFICATION AND COMPREHENSIVE DIAGNOSIS OF TELECOMMUNICATION SYSTEMS." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 69 (2020): 58–65. http://dx.doi.org/10.17721/2519-481x/2020/69-06.
Full textBudzyński, Marcin, Jacek Szmagliński, Kazimierz Jamroz, Krystian Birr, Sławomir Grulkowski, and Joanna Wachnicka. "Assessing Tram Infrastructure Safety Using the Example of the City of Gdańsk." Journal of KONBiN 49, no. 3 (2019): 293–322. http://dx.doi.org/10.2478/jok-2019-0060.
Full textAl-Tameemi, M. M. A., A. A. H. Alzaghir, and M. A. M. Alsweity. "Comprehensive Review of Deep Learning in Intrusion Detection Systems." Proceedings of Telecommunication Universities 11, no. 3 (2025): 72–86. https://doi.org/10.31854/1813-324x-2025-11-3-72-86.
Full textChakkarapani Sumathi, Thilagasree, Jayakumar Thippan, Brainy Joseph Raj Vikilal Joice, Pragathi Subramaniam, and Daekook Kang. "A comprehensive decision assessment for trust evaluation in wireless sensor networks." Yugoslav Journal of Operations Research, no. 00 (2024): 11. http://dx.doi.org/10.2298/yjor240217011c.
Full textCarneiro, Joana, Dália Loureiro, Marta Cabral, and Dídia Covas. "Comprehensive Resilience Assessment Framework for Water Distribution Networks." Water 16, no. 18 (2024): 2611. http://dx.doi.org/10.3390/w16182611.
Full textZhao, Qing Jian, and Zuo Min Wen. "Complex Social-Ecological Systems Network:New Perspective on the Sustainability." Advanced Materials Research 361-363 (October 2011): 1467–71. http://dx.doi.org/10.4028/www.scientific.net/amr.361-363.1467.
Full textRaenu, Raenu, Suhas Gupta, Shashikant Patil, Jaymeel Shah, Abhinav Mishra, and N. Gobi. "Comprehensive Analysis of Implementation and Evaluation IoT based Techniques in Networked Security Systems." Journal of Intelligent Systems and Internet of Things 13, no. 2 (2024): 35–51. http://dx.doi.org/10.54216/jisiot.130203.
Full textZhou, Buxiang, Yating Cai, Tianlei Zang, Jiale Wu, Binjie Sun, and Shi Chen. "Reliability Assessment of Cyber–Physical Distribution Systems Considering Cyber Disturbances." Applied Sciences 13, no. 6 (2023): 3452. http://dx.doi.org/10.3390/app13063452.
Full textTeng, Tangyong, Yu Huang, Juan Wang, Zhukun Li, and Yonghua Chen. "Risk Assessment Method for Distributed Power Distribution Networks Considering Network Dynamic Reconstruction." Elektronika ir Elektrotechnika 30, no. 4 (2024): 26–34. http://dx.doi.org/10.5755/j02.eie.38195.
Full textBai, Jiujun, and Xuebo Chen. "A Dynamic Security Assessment Method for Ironmaking Plants Based on Cloud-Edge Collaboration in Reconstructed Networks." Sustainability 16, no. 6 (2024): 2399. http://dx.doi.org/10.3390/su16062399.
Full textLiu, Zhenliang, Chi Zhang, Xinru Ran, Hang Zhou, Kun Fang, and Weigang Zhao. "Integrated Redundancy Assessment of Highway Bridge Network Systems Subjected to Emergencies." Earthquake Engineering and Resilience 4, no. 1 (2025): 61–75. https://doi.org/10.1002/eer2.109.
Full textCastañon, Ugo N., Paulo J. G. Ribeiro, and José F. G. Mendes. "Evaluating Urban Bikeability: A Comprehensive Assessment of Póvoa de Varzim’s Network." Sustainability 16, no. 21 (2024): 9472. http://dx.doi.org/10.3390/su16219472.
Full textEstakhr, Javad, Mohsen Simab, and Taher Niknam. "Security Analysis of Hybrid Multi-Carrier Energy Systems." Sustainability 13, no. 6 (2021): 3102. http://dx.doi.org/10.3390/su13063102.
Full textBhavani, Y., Sanjusree Vodapally, Dinesh Bokka, Harshitha Varma Muddasani, and Deepika Kasturi. "Advancements in gas leakage detection and risk assessment: a comprehensive survey." Indonesian Journal of Electrical Engineering and Computer Science 39, no. 1 (2025): 614. https://doi.org/10.11591/ijeecs.v39.i1.pp614-624.
Full textSong, Ki-Han, Ha-Jeong Lee, and Wonho Suh. "A Vulnerability Index for Multimodal Transportation Networks: The Case of Korea." Applied Sciences 15, no. 15 (2025): 8201. https://doi.org/10.3390/app15158201.
Full textPark, Junbeom, Taehoon Eom, Hyungeun Kim, Hyeonsu Park, Zizung Yoon, and Jongsou Park. "Threat Vector–Hierarchical Attack Representation Model-Based Threat Modeling and Security Assessment for Satellite Networks." Applied Sciences 15, no. 5 (2025): 2751. https://doi.org/10.3390/app15052751.
Full textPalko, Dmytro, and Larysa Myrutenko. "METHOD OF COMPREHENSIVE CYBERSECURITY RISKS ASSESSMENT IN DISTRIBUTED INFORMATION SYSTEMS." Cybersecurity: Education, Science, Technique 2, no. 26 (2024): 487–502. https://doi.org/10.28925/2663-4023.2024.26.731.
Full textMeteleva, M. A. "DESIGN OF ENTREPRENEURIAL NETWORKS: EVALUATION OF THE NETWORK POTENTIAL IN RUSSIAN ARCTIC." Север и рынок: формирование экономического порядка 69, no. 3/2020 (2020): 56–71. http://dx.doi.org/10.37614/2220-802x.2.2020.69.004.
Full textPierce, Gregory, Grace Harrison, Lena Schlichting, and Laura Landes. "Closing US Drinking Water Quality Gaps: The Role of Comprehensive Assessment." Journal AWWA 116, no. 7 (2024): 28–35. http://dx.doi.org/10.1002/awwa.2317.
Full textZhou, Liang Sheng, Zhen Dong Tan, and Wei Guo Wu. "Study on Quality Management of Logistics Equipment Systems." Advanced Materials Research 662 (February 2013): 993–98. http://dx.doi.org/10.4028/www.scientific.net/amr.662.993.
Full textZardari, Shehnila, Sana Alam, Hamad Abosaq Al Salem, et al. "A Comprehensive Bibliometric Assessment on Software Testing (2016–2021)." Electronics 11, no. 13 (2022): 1984. http://dx.doi.org/10.3390/electronics11131984.
Full textZisiadis, Dimitris, George Thanos, Spyros Kopsidas, and George Leventakis. "STAR-TRANS Modeling Language." International Journal of Information Systems for Crisis Response and Management 5, no. 2 (2013): 45–59. http://dx.doi.org/10.4018/jiscrm.2013040104.
Full textDu, Zhiqiang, Haitao Yao, Yanfang Fu, Zijian Cao, Hongtao Liang, and Jinkang Ren. "Network Situation Assessment Method Based on Improved BP Neural Network." Electronics 12, no. 3 (2023): 483. http://dx.doi.org/10.3390/electronics12030483.
Full textWang, Chen, Qizhi Tang, Bo Wu, Yan Jiang, and Jingzhou Xin. "Intelligent bridge monitoring system operational status assessment using analytic network-aided triangular intuitionistic fuzzy comprehensive model." Intelligence & Robotics 5, no. 2 (2025): 378–403. https://doi.org/10.20517/ir.2025.19.
Full textZhang, Guochang. "The Evaluation and Development of University English Teaching Quality Based on Wireless Network Artificial Intelligence." Journal of Combinatorial Mathematics and Combinatorial Computing 117 (December 31, 2023): 77–86. http://dx.doi.org/10.61091/jcmcc117-08.
Full textWu, Zhize, Zhiwen Zhou, Gang Zhang, Xiaoyu Zhang, Wenjie Dong, and Yanle Liu. "Temporal Scenarios-based Assessment of Maximum Hosting Capacity of Renewable Generation in Distribution Systems Considering ANM Techniques." Journal of Physics: Conference Series 2774, no. 1 (2024): 012028. http://dx.doi.org/10.1088/1742-6596/2774/1/012028.
Full textSahitya, Kurre Sai, and C. S. R. K. Prasad. "A Methodology for a Comprehensive Evaluation of an Urban Transport Network Structure Using Geographical Information Systems (GIS)." Slovak Journal of Civil Engineering 32, no. 2 (2024): 48–57. http://dx.doi.org/10.2478/sjce-2024-0013.
Full textZhang, Shengzhi, Xiaoqi Jia, Peng Liu, and Jiwu Jing. "PEDA: Comprehensive Damage Assessment for Production Environment Server Systems." IEEE Transactions on Information Forensics and Security 6, no. 4 (2011): 1323–34. http://dx.doi.org/10.1109/tifs.2011.2162062.
Full textChambers, Flann, Giovanna Di Marzo Serugendo, and Christophe Cruz. "Autonomous Generation of a Public Transportation Network by an Agent-Based Model: Mutual Enrichment with Knowledge Graphs for Sustainable Urban Mobility." Sustainability 16, no. 20 (2024): 8907. http://dx.doi.org/10.3390/su16208907.
Full textZhiming, Cai, Li Daming, and Deng Lianbing. "Risk evaluation of urban rainwater system waterlogging based on neural network and dynamic hydraulic model." Journal of Intelligent & Fuzzy Systems 39, no. 4 (2020): 5661–71. http://dx.doi.org/10.3233/jifs-189045.
Full textMahmood K. Al-Obaidi, Husam M. Al-Faris, and Raghdah H. Al-Sherif. "A Comprehensive Evaluation Study for the Maintenance Management System of Roadways: A Review." Journal of AL-Farabi for Engineering Sciences 2, no. 1 (2023): 13. http://dx.doi.org/10.59746/jfes.v2i1.61.
Full textOdarchenko, Roman, Maksim Iavich, Giorgi Iashvili, Solomiia Fedushko, and Yuriy Syerov. "Assessment of Security KPIs for 5G Network Slices for Special Groups of Subscribers." Big Data and Cognitive Computing 7, no. 4 (2023): 169. http://dx.doi.org/10.3390/bdcc7040169.
Full textTiwari, Shivam. "Enhancing Financial Crime Detection through Data Science-Driven Transaction Monitoring: A Comprehensive Framework for Modern Financial Institutions." International Journal of Computing and Engineering 7, no. 13 (2025): 53–63. https://doi.org/10.47941/ijce.3001.
Full textGuo, Wei-Feng, Xiangtian Yu, Qian-Qian Shi, Jing Liang, Shao-Wu Zhang, and Tao Zeng. "Performance assessment of sample-specific network control methods for bulk and single-cell biological data analysis." PLOS Computational Biology 17, no. 5 (2021): e1008962. http://dx.doi.org/10.1371/journal.pcbi.1008962.
Full textLi, Yalei. "Formative Assessment of College English Autonomous Learning Based on Fuzzy Comprehensive Evaluation Algorithm." Mobile Information Systems 2022 (July 30, 2022): 1–9. http://dx.doi.org/10.1155/2022/7772762.
Full textAktayeva, Alimbubi, Yerkhan Makatov, Akku Kubigenova Tulegenovna, et al. "Cybersecurity Risk Assessments within Critical Infrastructure Social Networks." Data 8, no. 10 (2023): 156. http://dx.doi.org/10.3390/data8100156.
Full textAlhakami, Wajdi. "Computational Study of Security Risk Evaluation in Energy Management and Control Systems Based on a Fuzzy MCDM Method." Processes 11, no. 5 (2023): 1366. http://dx.doi.org/10.3390/pr11051366.
Full textYuchen, Wang, Xu Shuxiang, and Huang Qiongfang. "A NOVEL EVALUATION APPROACH TO FINDING LIGHTWEIGHT MACHINE LEARNING ALGORITHMS FOR INTRUSION DETECTION IN COMPUTER NETWORK." International Journal of Network Security & Its Applications (IJNSA) 7, no. 6 (2015): 01–13. https://doi.org/10.5281/zenodo.8382089.
Full textShivakumar MD and Mamatha N. "Applications of graph theory in cybersecurity: Network defense models." World Journal of Advanced Research and Reviews 14, no. 2 (2022): 735–43. https://doi.org/10.30574/wjarr.2022.14.2.0467.
Full textAnitha, L., Mohamed Rias Adnan, Nair V. P. Deepak, and Vikram V. T. Anoop. "Advancements in Automated Resume Assessment: A Comprehensive Survey." Journal of Advance Research in Mobile Computing 7, no. 1 (2024): 1–6. https://doi.org/10.5281/zenodo.14134650.
Full textKumar, Vikas, Mohit Mishra, Amit Kr Pathak, Dharmendra Kr Dubey, and Brahmpal Singh. "Environmental Impact Assessment using Social Network Analysis and Data Mining." Ecology, Environment and Conservation 29, no. 04 (2023): 1736–41. http://dx.doi.org/10.53550/eec.2023.v29i04.047.
Full textBolkunov, A. I., M. N. Krasil’shikov, and V. V. Malyshev. "Comprehensive Assessment of the Effectiveness of Navigation Satellite Systems." Journal of Computer and Systems Sciences International 61, no. 3 (2022): 430–46. http://dx.doi.org/10.1134/s1064230722030030.
Full textChiranjeevi, G., R. Abhishek Reddy, R. Shyam, Swati Sah, and Rejwan Bin Sulaiman. "Docker Based Decentralized Vulnerability Assessment with Port Scanning Powered by Artificial Intelligence." FMDB Transactions on Sustainable Intelligent Networks 1, no. 4 (2024): 220–41. https://doi.org/10.69888/ftsin.2024.000290.
Full textMedini, Khaled, Sophie Peillon, Martha Orellano, Stefan Wiesner, and Ang Liu. "System Modelling and Analysis to Support Economic Assessment of Product-Service Systems." Systems 9, no. 1 (2021): 6. http://dx.doi.org/10.3390/systems9010006.
Full textZhou, Changhong, Mu Chen, Jiangtao Chen, Yu Chen, and Wenwu Chen. "A Multi-Hazard Risk Assessment Model for a Road Network Based on Neural Networks and Fuzzy Comprehensive Evaluation." Sustainability 16, no. 6 (2024): 2429. http://dx.doi.org/10.3390/su16062429.
Full textGuo, Wei-Feng, Shao-Wu Zhang, Tao Zeng, Tatsuya Akutsu, and Luonan Chen. "Network control principles for identifying personalized driver genes in cancer." Briefings in Bioinformatics 21, no. 5 (2019): 1641–62. http://dx.doi.org/10.1093/bib/bbz089.
Full textKosichenko, Yuri, Oleg Baev, and Alexander Garbuz. "ASSESSMENT OF INTEGRATED RECONSTRUCTION AND MODERNIZATION IRRIGATION SYSTEMS." Melioration and Water Management 2021, no. 2 (2022): 6–11. http://dx.doi.org/10.32962/0235-2524-2021-2-6-11.
Full textIslam, Md Tawfiqul. "A QUANTITATIVE ASSESSMENT OF SECURE NEURAL NETWORK ARCHITECTURES FOR FAULT DETECTION IN INDUSTRIAL CONTROL SYSTEMS." Review of Applied Science and Technology 02, no. 04 (2023): 01–24. https://doi.org/10.63125/3m7gbs97.
Full textAhasan Habib, AKM, Ahmed Imtiaz, Dhonita Tripura, et al. "Distributed denial-of-service attack detection short review: issues, challenges, and recommendations." Bulletin of Electrical Engineering and Informatics 14, no. 1 (2025): 438–46. http://dx.doi.org/10.11591/eei.v14i1.8377.
Full textPetković, Miro, Igor Vujović, Nediljko Kaštelan, and Joško Šoda. "Every Vessel Counts: Neural Network Based Maritime Traffic Counting System." Sensors 23, no. 15 (2023): 6777. http://dx.doi.org/10.3390/s23156777.
Full text